CN113052711A - Insurance security risk control method and device based on block chain - Google Patents

Insurance security risk control method and device based on block chain Download PDF

Info

Publication number
CN113052711A
CN113052711A CN202110599455.XA CN202110599455A CN113052711A CN 113052711 A CN113052711 A CN 113052711A CN 202110599455 A CN202110599455 A CN 202110599455A CN 113052711 A CN113052711 A CN 113052711A
Authority
CN
China
Prior art keywords
information
user
risk
security
project
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110599455.XA
Other languages
Chinese (zh)
Other versions
CN113052711B (en
Inventor
薛磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoren Property Insurance Co ltd
Original Assignee
Guoren Property Insurance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoren Property Insurance Co ltd filed Critical Guoren Property Insurance Co ltd
Priority to CN202110599455.XA priority Critical patent/CN113052711B/en
Publication of CN113052711A publication Critical patent/CN113052711A/en
Application granted granted Critical
Publication of CN113052711B publication Critical patent/CN113052711B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of computers, in particular to an insurance security risk control method and device based on a block chain, the method comprises obtaining insurance security request, obtaining security item identification and user identification, searching item risk level corresponding to the security item identification, searching user information corresponding to the user identification, receiving real-time user identity information and position information, obtaining corresponding risk grade according to the similarity, determining the final risk grade of the security project, searching corresponding risk prompt information in the project risk library according to the security project identification and the final risk level, sending the risk prompt information to a block chain network, providing a wind control thought for an insurance organization providing security service, and corresponding security project acceptance modes are executed according to risks of different levels, so that the loss caused by insufficient risk evaluation is avoided and controlled more possibly.

Description

Insurance security risk control method and device based on block chain
Technical Field
The invention relates to the technical field of computers, in particular to an insurance security risk control method and device based on a block chain.
Background
Insurance security refers to after-sales service work that is performed by insurance companies around the items such as contract change, annuity, or installment of a good fund, and in popular terms, in order to validate the policy of a customer, the insurance companies continue to service the customer after changing the policy under the request of the customer.
The situation of insurance policy change accompanied with insurance benefit transfer brings certain risks to the insurance process and the services, and if the risks in the insurance services are accurately evaluated and controlled each time, immeasurable losses are brought to insurance institutions and clients.
Disclosure of Invention
In view of the above, embodiments of the present invention are proposed to provide a block chain based insurance security risk control method and apparatus that overcome or at least partially solve the above problems.
The invention provides an insurance security risk control method based on a block chain, which comprises the following steps:
acquiring an insurance security request based on a block chain network;
analyzing the insurance security request to obtain a security item identifier and a user identifier;
searching a project risk level corresponding to the security project identification in a preset project risk library according to the security project identification, and taking the project risk level searched in the project risk library as an initial risk level;
searching user information corresponding to the user identification in a preset user information base according to the user identification, wherein the user information comprises user identity information and user historical position information, and sending a request for acquiring the identity information and the position information in real time to a block chain network;
receiving real-time user identity information and position information in a block chain network, judging the similarity between the real-time user identity information and the real-time user position information through the user information searched in the user information base, and taking a risk grade corresponding to the similarity as a secondary risk grade;
and determining the final risk level of the security project according to the initial risk level and the secondary risk level, searching corresponding risk prompt information in the project risk library according to the security project identifier and the final risk level, and sending the risk prompt information to a block chain network.
Preferably, after searching for corresponding risk prompt information in the project risk library according to the security project identifier and the final risk level and sending the risk prompt information to a blockchain network, the method includes:
acquiring confirmation information fed back by the user terminal to the risk prompt information based on the block chain network;
searching a corresponding target acceptance scheme in a preset acceptance scheme library according to the final risk level and the security project identification;
and executing security operation on the security project corresponding to the security project identifier according to the target acceptance scheme.
Preferably, the receiving real-time user identity information and location information in the blockchain-based network includes:
receiving identity information combined by one or more of user fingerprint information, face information, sound source information and signature information which are collected in real time;
sending the combined identity information and the user identity information stored in the user information base to a third party authority certification authority for comparison;
and obtaining the compared similarity result sent by the third party authority certification authority.
Preferably, the receiving real-time user identity information and location information in the blockchain-based network includes:
sending the user identity information containing the mobile phone number of the user to a mobile operation mechanism;
acquiring historical positioning information of a user corresponding to the mobile phone number of the user;
and comparing the user position information received in real time with the historical positioning information, and judging the similarity between the real-time position information and the historical positioning information.
Still provide an insurance security risk control device based on block chain, its characterized in that includes:
the acquisition module is used for acquiring an insurance security request based on the block chain network;
the analysis module is used for analyzing the insurance security request to obtain a security project identifier and a user identifier;
the first searching module is used for searching the project risk level corresponding to the security project identifier in a preset project risk library according to the security project identifier, and taking the project risk level searched in the project risk library as an initial risk level;
the second searching module is used for searching user information corresponding to the user identification in a preset user information base according to the user identification, wherein the user information comprises user identity information and user historical position information, and sending a request for acquiring the identity information and the position information in real time to the blockchain network;
the judging module is used for receiving real-time user identity information and position information based on a block chain network, judging the similarity between the real-time user identity information and the real-time position information through the user information searched in the user information base, and taking a risk grade corresponding to the similarity as a secondary risk grade;
and the determining module is used for determining the final risk level of the security project according to the initial risk level and the secondary risk level, searching corresponding risk prompt information in the project risk library according to the security project identifier and the final risk level, and sending the risk prompt information to the blockchain network.
Preferably, the determining module includes:
acquiring confirmation information fed back by the user terminal to the risk prompt information based on the block chain network;
searching a corresponding target acceptance scheme in a preset acceptance scheme library according to the final risk level and the security project identification;
and executing security operation on the security project corresponding to the security project identifier according to the target acceptance scheme.
Preferably, the judging module includes:
receiving identity information combined by one or more of user fingerprint information, face information, sound source information and signature information which are collected in real time;
sending the combined identity information and the user identity information stored in the user information base to a third party authority certification authority for comparison;
and obtaining the compared similarity result sent by the third party authority certification authority.
Preferably, the judging module includes:
sending the user identity information containing the mobile phone number of the user to a mobile operation mechanism;
acquiring historical positioning information of a user corresponding to the mobile phone number of the user;
and comparing the user position information received in real time with the historical positioning information, and judging the similarity between the real-time position information and the historical positioning information.
The embodiment of the invention has the following advantages:
the invention integrates the security project risks in the request and the risks of the security requesters, provides a wind control idea for insurance organizations providing security service, executes corresponding security project acceptance modes aiming at the risks of different levels, and avoids and controls the loss caused by insufficient risk evaluation with great possibility.
Drawings
FIG. 1 is a flow chart of the steps of a block chain based insurance security risk control method of the present invention;
fig. 2 is a block diagram of an insurance security risk control apparatus based on a block chain according to the present invention.
Fig. 3 is a block diagram of a block chain-based insurance security risk control computer device according to the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
An execution main body of the insurance security risk control method based on the block chain provided by the embodiment of the present application is generally a computer device with certain computing capability, and the computer device includes: a terminal device, which may be a user device, a mobile device, a user terminal, a cellular telephone, a cordless telephone, a personal digital assistant, a handheld device, a computing device, a vehicle device, a wearable device, or the like, or a server or other processing device. In some possible implementations, the user classification model training method and the user classification method may be implemented by a processor calling computer-readable instructions stored in a memory.
The following describes a block chain-based insurance risk control method disclosed in the present application by taking an execution subject as a computer device as an example.
Referring to fig. 1, a flow chart of the steps of the block chain-based insurance security risk control method of the present invention is shown, the method steps including:
s100, acquiring an insurance security request based on a block chain network;
s200, analyzing the insurance security request to obtain a security project identifier and a user identifier;
s300, searching a project risk level corresponding to the security project identification in a preset project risk library according to the security project identification, and taking the project risk level searched in the project risk library as an initial risk level;
s400, searching user information corresponding to the user identification in a preset user information base according to the user identification, wherein the user information comprises user identity information and user historical position information, and sending a request for acquiring the identity information and the position information in real time to a block chain network;
s500, receiving real-time user identity information and position information based on a block chain network, judging the similarity between the real-time user identity information and the real-time position information through the user information searched in the user information base, and taking a risk grade corresponding to the similarity as a secondary risk grade;
s600, determining the final risk level of the security project according to the initial risk level and the secondary risk level, searching corresponding risk prompt information in the project risk library according to the security project identifier and the final risk level, and sending the risk prompt information to a block chain network.
According to the steps of the embodiment, the security project risks in the request and the risks of the security requesters are integrated, a wind control thought is provided for the insurance organization providing security service, corresponding security project accepting modes are executed according to the risks of different levels, and loss caused by insufficient risk evaluation is avoided more possibly.
The technical scheme aims to prompt the user of the risk information of the security project to be changed so as to facilitate the user to confirm; and prompting the risk coefficient of the insurance request sent by the user to the insurance mechanism so that the insurance mechanism can conveniently deal with the risk coefficient in a reasonable mode. Specifically, a user initiates a security request for changing an original insurance item through a terminal, each changed insurance item corresponds to a security item identifier, different or the same risk level is corresponded to each security item identifier in the item risk library, and each risk level has different or the same risk prompt corresponding to different security item identifiers.
After the initial risk level of the security project is determined, the user information corresponding to the user identification is extracted to carry out risk assessment on the user (security applicant), and the user identity information and the position information which are acquired by the user terminal in real time are compared and judged with the user information corresponding to the user identification in the user information base.
The secondary risk level and the initial risk level are integrated in multiple ways, and the embodiment adopts a direct accumulation way, that is, if the initial risk level is B, the secondary risk level is C, and the integrated risk level is B + C, according to the final risk level B + C, the tag item risk library is returned to search for the risk prompt corresponding to the security item identifier and send the risk prompt.
In an embodiment, after the searching for the corresponding risk prompting information in the project risk library according to the security project identifier and the final risk level and sending the risk prompting information to a blockchain network, the method includes:
acquiring confirmation information fed back by the user terminal to the risk prompt information based on the block chain network;
searching a corresponding target acceptance scheme in a preset acceptance scheme library according to the final risk level and the security project identification;
and executing security operation on the security project corresponding to the security project identifier according to the target acceptance scheme.
Understandably, after the user confirms the risk prompt information, the user is indicated to select to carry out security protection on the insurance item under the condition of clear risk, and then the security protection operation corresponding to the risk level is executed under the idea of the user, so that the security risk of the insurance mechanism is reduced.
In an embodiment, the receiving real-time user identity information and location information in the blockchain-based network includes:
receiving identity information combined by one or more of user fingerprint information, face information, sound source information and signature information which are collected in real time;
sending the combined identity information and the user identity information stored in the user information base to a third party authority certification authority for comparison;
and obtaining the compared similarity result sent by the third party authority certification authority.
Understandably, the third party authority certification authority can be a national level certification authority, so that the accuracy and authority of user identity verification are improved, and certain security risk is reduced. However, in the actual verification process, the verification result is marked by the similarity due to the limitation of scene environment and user characteristic loss, and different similarities can be divided into corresponding risk levels.
In an embodiment, the receiving real-time user identity information and location information in the blockchain-based network includes:
sending the user identity information containing the mobile phone number of the user to a mobile operation mechanism;
acquiring historical positioning information of a user corresponding to the mobile phone number of the user;
and comparing the user position information received in real time with the historical positioning information, and judging the similarity between the real-time position information and the historical positioning information.
Understandably, the mobile phone number in the user information is acquired, the mobile phone number is sent to a mobile operation mechanism for number history positioning inquiry, the user constant address range is obtained, and whether the user is in the attachment of the constant address range can be judged according to the real-time position information so as to evaluate the risk level.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 2, a block diagram of a block chain-based insurance security risk control apparatus according to the present invention is shown, which may specifically include the following modules:
an obtaining module 100, configured to obtain an insurance security request based on a blockchain network;
the analysis module 200 is used for analyzing the insurance security request to obtain a security item identifier and a user identifier;
a first searching module 300, configured to search, according to the security item identifier, an item risk level corresponding to the security item identifier in a preset item risk library, and use the item risk level searched in the item risk library as an initial risk level;
a second searching module 400, configured to search, according to the user identifier, user information corresponding to the user identifier in a preset user information base, where the user information includes user identity information and user historical location information, and send a request for acquiring the identity information and the location information in real time to a blockchain network;
a judging module 500, configured to receive real-time user identity information and location information in a blockchain network, judge, through user information searched in the user information base, a similarity between the real-time user identity information and the location information, and use a risk level corresponding to the similarity as a secondary risk level;
a determining module 600, configured to determine a final risk level of the security project according to the initial risk level and the secondary risk level, search, in the project risk library, corresponding risk prompt information according to the security project identifier and the final risk level, and send the risk prompt information to a blockchain network.
In one embodiment, the validation module 600 includes:
acquiring confirmation information fed back by the user terminal to the risk prompt information based on the block chain network;
searching a corresponding target acceptance scheme in a preset acceptance scheme library according to the final risk level and the security project identification;
and executing security operation on the security project corresponding to the security project identifier according to the target acceptance scheme.
In an embodiment, the determining module 500 includes:
receiving identity information combined by one or more of user fingerprint information, face information, sound source information and signature information which are collected in real time;
sending the combined identity information and the user identity information stored in the user information base to a third party authority certification authority for comparison;
and obtaining the compared similarity result sent by the third party authority certification authority.
In an embodiment, the determining module 500 includes:
sending the user identity information containing the mobile phone number of the user to a mobile operation mechanism;
acquiring historical positioning information of a user corresponding to the mobile phone number of the user;
and comparing the user position information received in real time with the historical positioning information, and judging the similarity between the real-time position information and the historical positioning information.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Fig. 3 shows a computer device for block chain-based insurance security risk control according to the present invention, which specifically includes the following:
in an embodiment of the present invention, the present invention further provides a computer device, where the computer device 12 is represented in a general computing device, and the components of the computer device 12 may include but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus 18 structures, including a memory bus 18 or memory controller, a peripheral bus 18, an accelerated graphics port, and a processor or local bus 18 using any of a variety of bus 18 architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus 18, micro-channel architecture (MAC) bus 18, enhanced ISA bus 18, audio Video Electronics Standards Association (VESA) local bus 18, and Peripheral Component Interconnect (PCI) bus 18.
Computer device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 31 and/or cache memory 32. Computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (commonly referred to as "hard drives"). Although not shown in FIG. 3, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. The memory may include at least one program product having a set (e.g., at least one) of program modules 42, with the program modules 42 configured to carry out the functions of embodiments of the invention.
A program/utility 41 having a set (at least one) of program modules 42 may be stored, for example, in memory, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules 42, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, camera, etc.), with one or more devices that enable a user to interact with computer device 12, and/or with any devices (e.g., network card, modem, etc.) that enable computer device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, computer device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN)), a Wide Area Network (WAN), and/or a public network (e.g., the Internet) via network adapter 20. As shown, the network adapter 21 communicates with the other modules of the computer device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computer device 12, including but not limited to: microcode, device drivers, redundant processing units 16, external disk drive arrays, RAID systems, tape drives, and data backup storage systems 34, etc.
The processing unit 16 executes various functional applications and data processing by running programs stored in the system memory 28, for example, implementing a block chain-based insurance security risk control method provided by an embodiment of the present invention.
In an embodiment of the present invention, the present invention further provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements a block chain-based insurance security risk control method as provided in all embodiments of the present application.
Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer-readable storage medium or a computer-readable signal medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPOM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The insurance security risk control method and device based on the block chain provided by the invention are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation mode of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. The insurance security risk control method based on the block chain is characterized by comprising the following steps:
acquiring an insurance security request based on a block chain network;
analyzing the insurance security request to obtain a security item identifier and a user identifier;
searching a project risk level corresponding to the security project identification in a preset project risk library according to the security project identification, and taking the project risk level searched in the project risk library as an initial risk level;
searching user information corresponding to the user identification in a preset user information base according to the user identification, wherein the user information comprises user identity information and user historical position information, and sending a request for acquiring the identity information and the position information in real time to a block chain network;
receiving real-time user identity information and position information in a block chain network, judging the similarity between the real-time user identity information and the real-time user position information through the user information searched in the user information base, and taking a risk grade corresponding to the similarity as a secondary risk grade;
and determining the final risk level of the security project according to the initial risk level and the secondary risk level, searching corresponding risk prompt information in the project risk library according to the security project identifier and the final risk level, and sending the risk prompt information to a block chain network.
2. The method according to claim 1, wherein the searching for corresponding risk alert information in the item risk library according to the security item identifier and the final risk level, and after sending the risk alert information to a blockchain network, comprises:
acquiring confirmation information fed back by the user terminal to the risk prompt information based on the block chain network;
searching a corresponding target acceptance scheme in a preset acceptance scheme library according to the final risk level and the security project identification;
and executing security operation on the security project corresponding to the security project identifier according to the target acceptance scheme.
3. The method of claim 1, wherein receiving real-time user identity information and location information in the blockchain-based network comprises:
receiving identity information combined by one or more of user fingerprint information, face information, sound source information and signature information which are collected in real time;
sending the combined identity information and the user identity information stored in the user information base to a third party authority certification authority for comparison;
and obtaining the compared similarity result sent by the third party authority certification authority.
4. The method of claim 1, wherein receiving real-time user identity information and location information in the blockchain-based network comprises:
sending the user identity information containing the mobile phone number of the user to a mobile operation mechanism;
acquiring historical positioning information of a user corresponding to the mobile phone number of the user;
and comparing the user position information received in real time with the historical positioning information, and judging the similarity between the real-time position information and the historical positioning information.
5. Insurance security risk control device based on block chain, its characterized in that includes:
the acquisition module is used for acquiring an insurance security request based on the block chain network;
the analysis module is used for analyzing the insurance security request to obtain a security project identifier and a user identifier;
the first searching module is used for searching the project risk level corresponding to the security project identifier in a preset project risk library according to the security project identifier, and taking the project risk level searched in the project risk library as an initial risk level;
the second searching module is used for searching user information corresponding to the user identification in a preset user information base according to the user identification, wherein the user information comprises user identity information and user historical position information, and sending a request for acquiring the identity information and the position information in real time to the blockchain network;
the judging module is used for receiving real-time user identity information and position information based on a block chain network, judging the similarity between the real-time user identity information and the real-time position information through the user information searched in the user information base, and taking a risk grade corresponding to the similarity as a secondary risk grade;
and the determining module is used for determining the final risk level of the security project according to the initial risk level and the secondary risk level, searching corresponding risk prompt information in the project risk library according to the security project identifier and the final risk level, and sending the risk prompt information to the blockchain network.
6. The apparatus of claim 5, wherein the determining module comprises:
acquiring confirmation information fed back by the user terminal to the risk prompt information based on the block chain network;
searching a corresponding target acceptance scheme in a preset acceptance scheme library according to the final risk level and the security project identification;
and executing security operation on the security project corresponding to the security project identifier according to the target acceptance scheme.
7. The apparatus of claim 5, wherein the determining module comprises:
receiving identity information combined by one or more of user fingerprint information, face information, sound source information and signature information which are collected in real time;
sending the combined identity information and the user identity information stored in the user information base to a third party authority certification authority for comparison;
and obtaining the compared similarity result sent by the third party authority certification authority.
8. The apparatus of claim 5, wherein the determining module comprises:
sending the user identity information containing the mobile phone number of the user to a mobile operation mechanism;
acquiring historical positioning information of a user corresponding to the mobile phone number of the user;
and comparing the user position information received in real time with the historical positioning information, and judging the similarity between the real-time position information and the historical positioning information.
9. Electronic device, characterized in that it comprises a processor, a memory and a computer program stored on said memory and capable of running on said processor, said computer program, when executed by said processor, implementing the method according to any one of claims 1 to 4.
10. Computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method according to any one of claims 1 to 4.
CN202110599455.XA 2021-05-31 2021-05-31 Insurance security risk control method and device based on block chain Active CN113052711B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110599455.XA CN113052711B (en) 2021-05-31 2021-05-31 Insurance security risk control method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110599455.XA CN113052711B (en) 2021-05-31 2021-05-31 Insurance security risk control method and device based on block chain

Publications (2)

Publication Number Publication Date
CN113052711A true CN113052711A (en) 2021-06-29
CN113052711B CN113052711B (en) 2021-08-17

Family

ID=76518714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110599455.XA Active CN113052711B (en) 2021-05-31 2021-05-31 Insurance security risk control method and device based on block chain

Country Status (1)

Country Link
CN (1) CN113052711B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103874065A (en) * 2012-12-17 2014-06-18 ***通信集团上海有限公司 Method and device for judging user position abnormity
US20150136552A1 (en) * 2013-11-20 2015-05-21 Pack And Track L.L.C. Pack and Track
US20160364727A1 (en) * 2015-06-11 2016-12-15 Early Warning Services, Llc System and method for identifying compromised accounts
CN108765175A (en) * 2018-06-01 2018-11-06 中国平安人寿保险股份有限公司 Declaration form saves information processing method, device, computer equipment and storage medium from damage
CN109213452A (en) * 2018-09-14 2019-01-15 广州闰业信息技术服务有限公司 A kind of electronics safety system based on block chain
CN109242261A (en) * 2018-08-14 2019-01-18 中国平安人寿保险股份有限公司 Save the method and terminal device of risk from damage based on big data assessment
CN110942395A (en) * 2019-11-26 2020-03-31 泰康保险集团股份有限公司 Insurance security risk control method, device, equipment and storage medium
CN112561684A (en) * 2020-12-15 2021-03-26 平安科技(深圳)有限公司 Financial fraud risk identification method and device, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103874065A (en) * 2012-12-17 2014-06-18 ***通信集团上海有限公司 Method and device for judging user position abnormity
US20150136552A1 (en) * 2013-11-20 2015-05-21 Pack And Track L.L.C. Pack and Track
US20160364727A1 (en) * 2015-06-11 2016-12-15 Early Warning Services, Llc System and method for identifying compromised accounts
CN108765175A (en) * 2018-06-01 2018-11-06 中国平安人寿保险股份有限公司 Declaration form saves information processing method, device, computer equipment and storage medium from damage
CN109242261A (en) * 2018-08-14 2019-01-18 中国平安人寿保险股份有限公司 Save the method and terminal device of risk from damage based on big data assessment
CN109213452A (en) * 2018-09-14 2019-01-15 广州闰业信息技术服务有限公司 A kind of electronics safety system based on block chain
CN110942395A (en) * 2019-11-26 2020-03-31 泰康保险集团股份有限公司 Insurance security risk control method, device, equipment and storage medium
CN112561684A (en) * 2020-12-15 2021-03-26 平安科技(深圳)有限公司 Financial fraud risk identification method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113052711B (en) 2021-08-17

Similar Documents

Publication Publication Date Title
US11709823B2 (en) Real time visual validation of digital content using a distributed ledger
WO2021068636A1 (en) Block chain-based creation method, apparatus, device and system for verifiable claim
US8971582B2 (en) Method and system for recording and transferring motor vehicle information
WO2020024407A1 (en) Electronic device, method for intelligently processing car insurance claim, and storage medium
US7865493B2 (en) Apparatus and method for searching for digital forensic data
CN106952165B (en) Method and system for vehicle insurance claims settlement and damage assessment
CN110705235B (en) Information input method and device for business handling, storage medium and electronic equipment
CN112181835B (en) Automatic test method, device, computer equipment and storage medium
CN110324314B (en) User registration method and device, storage medium and electronic equipment
WO2021196935A1 (en) Data checking method and apparatus, electronic device, and storage medium
CN113032834A (en) Database table processing method, device, equipment and storage medium
CN112214402A (en) Code verification algorithm selection method and device and storage medium
CN113177701A (en) User credit assessment method and device
CN113052711B (en) Insurance security risk control method and device based on block chain
CN110503393A (en) Electronic contract management method, system and electronic equipment for automobile leasing platform
CN115378806A (en) Flow distribution method and device, computer equipment and storage medium
CN113222769A (en) Insurance policy processing method and device based on Internet
CN108280139B (en) POI data processing method, device, equipment and computer readable storage medium
CN111489101A (en) Order auditing method, device, equipment and medium based on big data
CN115022002B (en) Verification mode determining method and device, storage medium and electronic equipment
US20230419413A1 (en) System and method for post-accident information gathering
CN115249052A (en) Identity card information input method and device, electronic equipment and storage medium
CN116668059A (en) Account security detection method, medium, device and computing equipment
CN112487436A (en) Monitoring method and system for mobile terminal
CN114329470A (en) Payment website identification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant